Firm: All
Practice Industry: Life Sciences, Technology
Region: All
Country/ State: All
Tag: All

Much has been made of the e-communication provisions set out in the new Companies Act 2006. However, less is known of a piece of legislation which came into force on 1 January 2007, the Companies (Registrar, Languages and Trading Disclosures) Regulations 2006, which affect the electronic communications of every company and limited liability partnership in the UK ...

Immediate access to the latest data is essential for business. The Internet and other networks ensure that data are readily accessible. But easy access to data carries with it certain risks, including the risk of unauthorised access. According to research by Gartner in 2006, 80 percent of companies will have suffered an application security incident by 2009 ...

Lavery Lawyers | January 2007

On November 9, 2006, the Minister of Justice, Yvon Marcoux, introduced Bill 48, entitled An Act to amend the Consumer Protection Act and the Act respecting the collection of certain debts (hereinafter, the “Bill”).The Bill is based on the Internet Sales Contract Harmonization Template agreed on by the provinces further to the Agreement on Internal Trade ...

Van Doorne N.V. | November 2006

The IT outsourcing market has matured in the past years. Many IT outsourcing relationships are fruitful and long lasting. Nevertheless international surveys continue to show that numerous outsourcing deals are untimely terminated in the first two to four years. This paper highlights the key risk factors for failure of IT outsourcing relationships. These key risk factors will be underlined by various failed outsourcing case law. Such case law probably only represents the top of the iceberg ...

Open source software ("OSS") is quickly entering the mainstream and becoming increasingly widely used. In fact International Data Group analysts have predicted that the OSS marketplace will be worth £35 billion by 2008. OSS is software that is freely available (without discrimination) and can be copied, modified and redistributed ...

Procuring and implementing an ICT system within an organisation can be a stressful task. High profile failures in both the public and private sectors hit the headlines all too often. The National Audit Office's report last month on the £6.2bn NHS IT upgrade in England put many of the challenges firmly in the spotlight. In the heat of the procurement process it is easy to forget some basic procurement principles ...

Deacons | July 2006

Every day in Mumbai, India, a team of 5,000 couriers deliver, collect and return 200,000 lunch boxes. This massive logistics operation is undertaken with an error rate of less than 1 in 8 million deliveries and without using any information technology. Enormous labour cost disparities enable this manual operation to be undertaken cost-effectively ...

The Police and Justice Bill was put before the House of Commons on 25 January 2006. The main aim of the Bill is to improve the powers and scope of the police force but there are a number of sections which look to update the Computer Misuse Act 1990 (CMA) and in particular to make Denial of Service (DOS) Attacks illegal. DOS attacks can take many forms but are essentially an attempt to disrupt the use of a computer, server or website ...

PLMJ | April 2006

Dominant companies have special responsibility to ensure that the way they do business doesn’t prevent competition on the merits and does not harm consumers and innovation», said European Competition Commissioner Mário Monti, regarding the Commission’s Microsoft decision dated March 24th, 2004 ...

PLMJ | April 2006

The interoperability information on Microsoft’s decision deserves special attention by the undertakings that have a dominant position in the market. Intellectual property rights, granted as an incentive for the creation of innovation and as a tool to recoup the investments made by companies, used to be understood as providing several rights to its owners ...

Deacons | March 2006

The China Banking Regulatory Commission (CBRC) recently promulgated Measures for the Administration of Electronic Banking Business (the Measures) and the Guidelines on E-banking Security Evaluation (the Guideline) ...

Deacons | February 2006

Complaints by foreign businesses regarding protection of intellectual property rights in China have been a consistent feature in media reports since large scale foreign investment commenced some 20 years ago. However, China's economic revolution over the same period means that opinions based on negative experiences in the past must be constantly reassessed ...

Internet telephones are set to take the global communications industry by storm. Big names like Microsoft, AOL, Yahoo! and eBay are piling into the market and former state-run telecoms providers like BT are also investing. The technology was first developed by the US Defense Department as part of a research project on interconnection in the 1970s. But until recently only techno-geeks have had the interest and ability to make any use of it. But times have changed ...

A&L Goodbody LLP | January 2006

On 1 May 2004 a new and revised Technology Transfer Block Exemption Regulation (the TTBER) entered into force - Regulation No. 772/2004. The TTBER will provide block exemptions for IP licensing agreements, ensuring that certain technology transfer agreements are automatically exempt from the application of Article 81(1) of the EC Treaty, which prohibits anti-competitive agreements ...

Haynes and Boone | December 2005

The European Union has recently launched a new ccTLD (country code top level domain). Instead of using the various national European ccTLD's, such as .fr for French companies, .de for German companies, and .co.uk for U.K. companies, the EU has made available the .eu suffix as a Community-wide ccTLD. The new domain extension has already proved widely popular, with more than 100,000 applications for domain names filed thus far ...

Haynes and Boone | December 2005

Germany. November 9, 1938. Kristallnacht. “The Night of Broken Glass.” Nazi secret police and the Hitler youth swarm over Jewish businesses and homes, terrorizing and victimizing helpless individuals all over the country.1 SS leadership orchestrates attacks on every vestige of Jewish culture as “punishment” for fictitious crimes that will never be recognized by the rest of the world ...

Shepherd and Wedderburn LLP | September 2005

At the end of June, the US entertainment industry won a long fought victory to help bring file swappers to heel ...

Shepherd and Wedderburn LLP | September 2005

The European Parliament dealt a blow to programmers seeking clarity on the patentability of computer-implemented inventions last month when it rejected a draft European Directive on the subject (the "CII Directive") by an overwhelming majority ...

Hunton Andrews Kurth LLP | September 2005

Summary ‡ Information security “breaches” take many forms and occur in a wide variety of settings. However, contrary to recent press reports, they do not appear to be increasing. ‡ Research indicates that only a small percentage of breaches result in any harmful use of data. ‡ Account fraud and true identity fraud — the two identity-based frauds most feared by consumers and policy makers — are actually declining ...

Deacons | August 2005

The Ministry of Information Industry ("MII") promulgated the Measures for the Administration of the Filing for the Record of Non-Commercial Internet Information Services (the "Recordal Measures") on 8 February 2005. The Recordal Measures took effect on 20 March 2005. It provides detailed guidelines on recordal filings for non-commercial websites ...

A&L Goodbody LLP | January 2005

When it comes to the patentability of computer-implemented inventions, Europe and the United States have differing and diverse opinions. The United States has a liberal approach to the patentability of computer software and will therefore grant patents for such inventions. Not so in Europe though, where computer programs are patentable only if they make a “technical contribution” to the state of the art ...

A&L Goodbody LLP | January 2005

ICC Publishes Paper on Internet Governance The Internet Corporation for Assigned Names and Numbers (ICANN), a private sector body based in California, currently operates the allocation of domain names and Internet Protocol addresses on a worldwide basis. At the World Summit on the Information Society in Geneva in December 2003, the issue of transferring ICANN’s role to the United Nations was raised by a number of developing countries ...

Deacons | October 2004

The Standing Committee of the 10th National People's Congress passed the Law of the People's Republic of China on Electronic Signatures on 28 August 2004. The Law, which was promulgated on 28 August by President Hu Jintao, will enter into effect on 1 April 2005 and provides a legal basis for electronic transactions. Electronic data text The Law applies to electronic signatures in electronic data text ...

Haynes and Boone | August 2003

California Law Requires Telling Your Customers That You've Been Hacked A new California Law (Assembly Bill No. 700, Chapter 1054) went into effect on July 1, 2002 that requires companies who conduct business in California to notify their California-resident customers if their unencrypted personel information may have been stolen as a result of a security breach ...

Haynes and Boone | July 2003

Technology Update Authors Brian D. Barnard Randall E. Colson M. Ann Newton Related Practice Groups Intellectual Property A new California Law (Assembly Bill No. 700, Chapter 1054) went into effect on July 1, 2002 that requires companies who conduct business in California to notify their California-resident customers if their unencrypted personel information may have been stolen as a result of a security breach ...

dots